All of lore.kernel.org
 help / color / mirror / Atom feed
* help needed, 2.6.31.6-rt19 hang with network user app
@ 2009-11-20 20:56 Leyendecker, Robert
  2009-11-20 21:44 ` Nikita V. Youshchenko
  0 siblings, 1 reply; 10+ messages in thread
From: Leyendecker, Robert @ 2009-11-20 20:56 UTC (permalink / raw)
  To: rt-users

Greetings:

I am hoping for some help troubleshooting a lockup related to networking. Apologies ahead for the detailed problem report and it is probably obvious I am a newbie to linux-rt, so this may or may not be the appropriate place to post this. Feel free to suggest the right location.   

Release:
FC10 release, 2.6.31.6-rt19 #1 SMP PREEMPT RT Wed Nov 18 22:20:20 CST 2009 i686 i686 i386 GNU/Linux
CPU core duo, T8400

Problem:
The problem does not occur when running FC10 release without RT patch.

I have three "threads" on the RT host A (affinity set to CPU0 - it seemed to work the best at reducing jitter):

Thread 1 (started using pthread, priority 49)
Start:
Set posix timer to expire in 5 msec
Output 128 packets (120 bytes each) to a single raw socket to Host B
Go to start

Thread 2 (run from main, priority 37)
Start:
Epoll for a single event on raw socket
Read one packet from Host B
Go to Start

Thread 3 (started from pthread, priority 25)
Print the rx and tx packet count

On other non-RT FC10 host B on network (connected by cisco gigE switch) the same thread is running, so they are exchanging packets. Usually I can get 30 minutes to 4 hours, and then the RT system hangs. Converting Host A to non-rt allows me to run 24 hours or more (no failures recorded). The application is meant to control packet jitter and RT does this well when it doesn't hang. I have also recorded instances of the RT system hanging when my app is not running, however, Host B is pounding the Host A interface with packets. This is more difficult to reproduce and believe I have encountered it only twice out of hundreds of tests.  I memlock about 100 Mbyte, only a fraction is used for the reduced test case.

Hang details:
1 The UI freezes. No keyboard or mouse. Graphics OK but screen freeze. 
2 Host B reports no data from Host A. When Host B is terminated and unplugged from network, the network card on Host A still blinks as if it is sending or receiving data. Unplugging Host A stops the blinking. Plugging A back in starts the blinking. I have waited up to 20 minutes or more and card still blinking.

Interrupts:
Note- I can make things better and worse by changing these settings, but am unable to resolve problem completely.
This is just last set-up I tried. I realize these may be incorrect and would appreciate some guidance.
This is heavy duty on network side so I have these at high priority. Mostly I am relying on ad-hoc & word of mouth on best settings.
It seems to be a black art. Same is true for stopped services.

I have tried both FF and RR settings.

irq rtc0 set to priority 90
irq eth0 not found.
irq eth1 set to priority 89
irq net-tx/0 set to priority 88
irq net-rx/0 set to priority 87
irq net-tx/1 set to priority 86
irq net-rx/1 set to priority 85
irq tasklet/0 set to priority 84
irq tasklet/1 set to priority 83
irq hrtimer/0 set to priority 82
irq hrtimer/1 set to priority 81
irq i8042 set to priority 20
irq bluetooth set to priority 19

Here is a sample of interrupts while things are working OK

  0:        371          7   IO-APIC-edge      timer
  1:          2          0   IO-APIC-edge      i8042
  4:          1          1   IO-APIC-edge
  7:          0          0   IO-APIC-edge      parport0
  8:         49         16   IO-APIC-edge      rtc0
  9:          0          0   IO-APIC-fasteoi   acpi
 12:          3          1   IO-APIC-edge      i8042
 16:        299      18241   IO-APIC-fasteoi   uhci_hcd:usb3, HDA Intel
 17:          0          1   IO-APIC-fasteoi   uhci_hcd:usb4, uhci_hcd:usb7
 18:          0          0   IO-APIC-fasteoi   uhci_hcd:usb8
 22:          1          2   IO-APIC-fasteoi   ehci_hcd:usb1, uhci_hcd:usb5
 23:          0          0   IO-APIC-fasteoi   ehci_hcd:usb2, uhci_hcd:usb6
 24:    1228084          0  HPET_MSI-edge      hpet2
 25:          0    1744782  HPET_MSI-edge      hpet3
 31:       2288      53354   PCI-MSI-edge      ahci
 33:      56567      56124   PCI-MSI-edge      i915@pci:0000:00:02.0
 34:    8035113    7957293   PCI-MSI-edge      eth1
NMI:          0          0   Non-maskable interrupts
LOC:       1704       1593   Local timer interrupts
SPU:          0          0   Spurious interrupts
CNT:          0          0   Performance counter interrupts
PND:          0          0   Performance pending work
RES:   10942640   10060362   Rescheduling interrupts
CAL:       5795       2565   Function call interrupts
TLB:        108        158   TLB shootdowns
TRM:          0          0   Thermal event interrupts
THR:          0          0   Threshold APIC interrupts
MCE:          0          0   Machine check exceptions
MCP:         22         22   Machine check polls
ERR:          0
MIS:          0


Performance:
Here is top while things are working OK  (user app is called smash)

top - 11:25:27 up  1:48,  4 users,  load average: 0.00, 0.00, 0.00
Tasks: 173 total,   1 running, 171 sleeping,   0 stopped,   1 zombie
Cpu(s):  7.0%us,  9.5%sy,  0.0%ni, 76.3%id,  0.0%wa,  0.0%hi,  7.3%si,  0.0%st
Mem:   2004612k total,   590240k used,  1414372k free,    51744k buffers
Swap:  4030456k total,        0k used,  4030456k free,   257776k cached

  PID USER      PR  NI  VIRT  RES  SHR S %CPU %MEM    TIME+  COMMAND
11190 root      -2  19  122m 122m 3088 S 32.9  6.3   6:48.44 smash
    7 root     -88  -5     0    0    0 S  8.0  0.0   1:43.43 sirq-net-rx/0
   21 root     -86  -5     0    0    0 S  7.6  0.0   4:11.65 sirq-net-rx/1
 9032 root     -90  -5     0    0    0 S  1.7  0.0   0:16.97 irq/34-eth1
    1 root      20   0  2008  772  564 S  0.0  0.0   0:02.37 init
    2 root      15  -5     0    0    0 S  0.0  0.0   0:00.00 kthreadd
    3 root      RT  -5     0    0    0 S  0.0  0.0   0:00.00 migration/0
    4 root     -50  -5     0    0    0 S  0.0  0.0   0:00.00 sirq-high/0
    5 root     -50  -5     0    0    0 S  0.0  0.0   0:00.00 sirq-timer/0
    6 root     -89  -5     0    0    0 S  0.0  0.0   0:00.00 sirq-net-tx/0
    8 root     -50  -5     0    0    0 S  0.0  0.0   0:00.00 sirq-block/0
    9 root     -85  -5     0    0    0 S  0.0  0.0   0:00.00 sirq-tasklet/0
   10 root     -50  -5     0    0    0 S  0.0  0.0   0:00.00 sirq-sched/0
   11 root     -83  -5     0    0    0 S  0.0  0.0   0:00.00 sirq-hrtimer/0
   12 root     -50  -5     0    0    0 S  0.0  0.0   0:00.00 sirq-rcu/0
   13 root      RT  -5     0    0    0 S  0.0  0.0   0:00.00 posixcputmr/0
   14 root      RT  -5     0    0    0 S  0.0  0.0   0:00.00 watchdog/0
   15 root      10 -10     0    0    0 S  0.0  0.0   0:00.00 desched/0
   16 root      RT  -5     0    0    0 S  0.0  0.0   0:00.00 migration/1
   17 root      RT  -5     0    0    0 S  0.0  0.0   0:00.00 posixcputmr/1
   18 root     -50  -5     0    0    0 S  0.0  0.0   0:00.00 sirq-high/1
   19 root     -50  -5     0    0    0 S  0.0  0.0   0:01.08 sirq-timer/1
   20 root     -87  -5     0    0    0 S  0.0  0.0   0:00.00 sirq-net-tx/1
   22 root     -50  -5     0    0    0 S  0.0  0.0   0:00.14 sirq-block/1
   23 root     -84  -5     0    0    0 S  0.0  0.0   0:00.02 sirq-tasklet/1
   24 root     -50  -5     0    0    0 S  0.0  0.0   0:00.00 sirq-sched/1
   25 root     -82  -5     0    0    0 S  0.0  0.0   0:00.00 sirq-hrtimer/1
   26 root     -50  -5     0    0    0 S  0.0  0.0   0:00.00 sirq-rcu/1
   27 root      RT  -5     0    0    0 S  0.0  0.0   0:00.00 watchdog/1
   28 root      10 -10     0    0    0 S  0.0  0.0   0:00.01 desched/1
   29 root      15  -5     0    0    0 S  0.0  0.0   0:00.00 rcu_sched_grace
   30 root      -2 -20     0    0    0 S  0.0  0.0   0:00.00 events/0
   31 root      -2 -20     0    0    0 S  0.0  0.0   0:00.19 events/1
   32 root      15  -5     0    0    0 S  0.0  0.0   0:00.00 cpuset
   33 root      15  -5     0    0    0 S  0.0  0.0   0:00.00 khelper
   38 root      15  -5     0    0    0 S  0.0  0.0   0:00.00 async/mgr
  161 root      15  -5     0    0    0 S  0.0  0.0   0:00.00 kintegrityd/0
  162 root      15  -5     0    0    0 S  0.0  0.0   0:00.00 kintegrityd/1
  164 root      15  -5     0    0    0 S  0.0  0.0   0:00.00 kblockd/0


Services:
Here is a list of services and status.

(Some services respond to status from my script with no text output and a "0" return, so 
I call these unable to determine, but they are really dead.)

initd acpid is stopped.
initd anacron is stopped.
initd atd is stopped.
initd auditd is started.
initd avahi-daemon is stopped.
initd bluetooth is stopped.
initd btseed is stopped.
initd bttrack is stopped.
initd cpuspeed is stopped.
initd crond is started.
initd cups is stopped.
initd cups-config-daemon is stopped.
initd dnsmasq is stopped.
initd firstboot is stopped.
initd fuse is started.
initd gpm is stopped.
initd haldaemon is started.
initd halt is stopped.
initd httpd is stopped.
initd ip6tables is stopped.
initd iptables is started.
initd irda is stopped.
initd irqbalance is stopped.
initd jetty is stopped.
initd kerneloops is stopped.
initd killall is stopped.
initd lm_sensors is stopped.
initd mdmonitor is stopped.
initd messagebus is started.
initd microcode_ctl unable to determine state.
initd multipathd is stopped.
initd netconsole is stopped.
initd netfs is stopped.
initd netplugd is stopped.
initd network is started.
initd NetworkManager is stopped.
initd nfs is stopped.
initd nfslock is stopped.
initd nmb is stopped.
initd nscd is stopped.
initd ntpd is stopped.
initd ntpdate is stopped.
initd pcscd is stopped.
initd portreserve is stopped.
initd psacct is stopped.
initd rdisc is stopped.
initd restorecond unable to determine state.
initd rpcbind is stopped.
initd rpcgssd is stopped.
initd rpcidmapd is started.
initd rpcsvcgssd is stopped.
initd rsyslog is stopped.
initd saslauthd is stopped.
initd sendmail is stopped.
initd setroubleshoot is stopped.
initd smartd is stopped.
initd smb is stopped.
initd smolt is stopped.
initd snmpd is stopped.
initd snmptrapd is stopped.
initd sshd is started.
initd udev-post unable to determine state.
initd winbind is stopped.
initd wpa_supplicant is stopped.
initd xinetd is stopped.
initd ypbind is stopped.

Timers:
OK - one thing that confuses me is the timer/clock situation
Any help here on the best settings is appreciated.

I see the following timers - any guidance on implications of changing priority of these?
sirq-timer
sirq-hrtimer
posixcputimer
rtc0
HPET (same as hrtimer?)

APIC:
I'm also confused about this - what is the best state for these services? It doesn't look like APIC is running. APIC interrupts are occurring however, I did include thermal and cpu modules when the kernel was built; everything else excluded. 

Many thanks for anyone who has made it this far and still willing to offer some suggestions on helping me debug.

-Bob





^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: help needed, 2.6.31.6-rt19 hang with network user app
  2009-11-20 20:56 help needed, 2.6.31.6-rt19 hang with network user app Leyendecker, Robert
@ 2009-11-20 21:44 ` Nikita V. Youshchenko
  2009-11-21  3:56   ` Leyendecker, Robert
  0 siblings, 1 reply; 10+ messages in thread
From: Nikita V. Youshchenko @ 2009-11-20 21:44 UTC (permalink / raw)
  To: Leyendecker, Robert; +Cc: rt-users

> Hang details:
> 1 The UI freezes. No keyboard or mouse. Graphics OK but screen freeze.
> 2 Host B reports no data from Host A. When Host B is terminated and
> unplugged from network, the network card on Host A still blinks as if it
> is sending or receiving data. Unplugging Host A stops the blinking.
> Plugging A back in starts the blinking. I have waited up to 20 minutes
> or more and card still blinking.

This looks like something in kernel crashed.

Does host A have a serial port? If yes, connect that to another host using 
a null-modem cable, boot host A with serial console (boot arg 
console=ttyS0,15200), and use that to extract kernel crash message. Then 
post that to this list.

^ permalink raw reply	[flat|nested] 10+ messages in thread

* RE: help needed, 2.6.31.6-rt19 hang with network user app
  2009-11-20 21:44 ` Nikita V. Youshchenko
@ 2009-11-21  3:56   ` Leyendecker, Robert
  2009-11-21  8:25     ` Nikita V. Youshchenko
  2009-11-27 19:43     ` Thomas Gleixner
  0 siblings, 2 replies; 10+ messages in thread
From: Leyendecker, Robert @ 2009-11-21  3:56 UTC (permalink / raw)
  To: Nikita V. Youshchenko; +Cc: rt-users



> -----Original Message-----
> From: Nikita V. Youshchenko [mailto:yoush@cs.msu.su]
> Sent: Friday, November 20, 2009 3:44 PM
> To: Leyendecker, Robert
> Cc: rt-users
> Subject: Re: help needed, 2.6.31.6-rt19 hang with network user app
>
> > Hang details:
> > 1 The UI freezes. No keyboard or mouse. Graphics OK but screen
> freeze.
> > 2 Host B reports no data from Host A. When Host B is terminated and
> > unplugged from network, the network card on Host A still blinks as if
> it
> > is sending or receiving data. Unplugging Host A stops the blinking.
> > Plugging A back in starts the blinking. I have waited up to 20
> minutes
> > or more and card still blinking.
>
> This looks like something in kernel crashed.
>
> Does host A have a serial port? If yes, connect that to another host
> using
> a null-modem cable, boot host A with serial console (boot arg
> console=ttyS0,15200), and use that to extract kernel crash message.
> Then
> post that to this list.

Thank you very much for the fast reply-

unfortunately - nothing shows up in the serial log after the normal boot spew. I do see some sort of cr/lf every second for a while.

I ran the test two times - once with services off and once with services on.

When I turned on services - something interesting happened. After a freeze period of at least 10 minutes, suddenly my program started running again and I got at least two pop-ups saying diagnostic info has been sent to kernel.org. Then everything was frozen and I power cycled.

Here is what was in the log/messages - I assume this is what was sent to kernel.org.  Host B is reporting destination unreachables at time of freeze.  Hope this log is useful. I have the full log from start of boot I can zip it up if you would like. At the bottom you can see where it is rebooting due to power cycle.



Nov 20 21:11:54 localhost init: serial main process (19239) killed by HUP signal
Nov 20 21:11:56 localhost init: serial main process (19253) killed by HUP signal
Nov 20 21:11:57 localhost init: serial main process (19266) killed by HUP signal
Nov 20 21:11:58 localhost init: serial main process (19279) killed by HUP signal
Nov 20 21:11:59 localhost init: serial main process (19292) killed by HUP signal
Nov 20 21:12:00 localhost init: serial main process (19305) killed by HUP signal
Nov 20 21:12:00 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:00 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:12:00 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:00 localhost kernel: Call Trace:
Nov 20 21:12:00 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:00 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:00 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:12:00 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:00 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:00 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:00 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:00 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:12:00 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:00 localhost kernel: Call Trace:
Nov 20 21:12:00 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:00 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:00 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:12:00 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:00 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:00 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:00 localhost nmbd[2256]: [2009/11/20 21:12:00,  0] nmbd/nmbd_become_lmb.c:become_local_master_stage2(395)
Nov 20 21:12:00 localhost nmbd[2256]:   *****
Nov 20 21:12:00 localhost nmbd[2256]:
Nov 20 21:12:00 localhost nmbd[2256]:   Samba name server XXXXX is now a local master browser for workgroup XXXXX on subnet XXXXXXXXX
Nov 20 21:12:00 localhost nmbd[2256]:
Nov 20 21:12:00 localhost nmbd[2256]:   *****
Nov 20 21:12:01 localhost init: serial main process (19318) killed by HUP signal
Nov 20 21:12:02 localhost init: serial main process (19331) killed by HUP signal
Nov 20 21:12:03 localhost init: serial main process (19344) killed by HUP signal
Nov 20 21:12:04 localhost init: serial main process (19357) killed by HUP signal
Nov 20 21:12:05 localhost kerneloops: Submitted 1 kernel oopses to www.kerneloops.org
Nov 20 21:12:05 localhost init: serial main process (19370) killed by HUP signal
Nov 20 21:12:06 localhost init: serial main process (19385) killed by HUP signal
Nov 20 21:12:07 localhost init: serial main process (19398) killed by HUP signal
Nov 20 21:12:08 localhost init: serial main process (19411) killed by HUP signal
Nov 20 21:12:09 localhost init: serial main process (19424) killed by HUP signal
Nov 20 21:12:10 localhost init: serial main process (19437) killed by HUP signal
Nov 20 21:12:10 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:10 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:12:10 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:10 localhost kernel: Call Trace:
Nov 20 21:12:10 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:10 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:10 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:12:10 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:10 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:10 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:10 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:10 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:12:10 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:10 localhost kernel: Call Trace:
Nov 20 21:12:10 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:10 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:10 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:12:10 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:10 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:10 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:11 localhost init: serial main process (19450) killed by HUP signal
Nov 20 21:12:12 localhost init: serial main process (19463) killed by HUP signal
Nov 20 21:12:13 localhost init: serial main process (19476) killed by HUP signal
Nov 20 21:12:14 localhost init: serial main process (19489) killed by HUP signal
Nov 20 21:12:14 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:14 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:12:14 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:14 localhost kernel: Call Trace:
Nov 20 21:12:14 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:14 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:14 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:12:14 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:14 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:14 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:14 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:14 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:12:14 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:14 localhost kernel: Call Trace:
Nov 20 21:12:14 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:14 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:14 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:12:14 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:14 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:14 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:14 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:14 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:12:14 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:14 localhost kernel: Call Trace:
Nov 20 21:12:14 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:14 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:14 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:12:14 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:14 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:14 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:14 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:14 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:12:14 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:14 localhost kernel: Call Trace:
Nov 20 21:12:14 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:14 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:14 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:12:14 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:14 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:14 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:15 localhost init: serial main process (19502) killed by HUP signal
Nov 20 21:12:16 localhost init: serial main process (19515) killed by HUP signal
Nov 20 21:12:16 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:16 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:12:16 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:16 localhost kernel: Call Trace:
Nov 20 21:12:16 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:16 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:16 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:12:16 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:16 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:16 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:16 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:16 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:12:16 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:16 localhost kernel: Call Trace:
Nov 20 21:12:16 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:16 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:16 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:12:16 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:16 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:16 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:17 localhost init: serial main process (19528) killed by HUP signal
Nov 20 21:12:18 localhost init: serial main process (19541) killed by HUP signal
Nov 20 21:12:18 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:18 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:12:18 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:18 localhost kernel: Call Trace:
Nov 20 21:12:18 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:18 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:18 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:12:18 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:18 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:18 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:18 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:18 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:12:18 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:18 localhost kernel: Call Trace:
Nov 20 21:12:18 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:18 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:18 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:12:18 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:18 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:18 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:19 localhost init: serial main process (19554) killed by HUP signal
Nov 20 21:12:20 localhost init: serial main process (19567) killed by HUP signal
Nov 20 21:12:20 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:20 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:12:20 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:20 localhost kernel: Call Trace:
Nov 20 21:12:20 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:20 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:20 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:12:20 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:20 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:20 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:20 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:20 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:12:20 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:20 localhost kernel: Call Trace:
Nov 20 21:12:20 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:20 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:20 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:12:20 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:20 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:20 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:21 localhost init: serial main process (19580) killed by HUP signal
Nov 20 21:12:22 localhost init: serial main process (19593) killed by HUP signal
Nov 20 21:12:22 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:22 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:12:22 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:22 localhost kernel: Call Trace:
Nov 20 21:12:22 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:22 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:22 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:12:22 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:22 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:22 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:22 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:22 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:12:22 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:22 localhost kernel: Call Trace:
Nov 20 21:12:22 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:22 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:22 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:12:22 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:22 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:22 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:22 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:22 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:12:22 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:22 localhost kernel: Call Trace:
Nov 20 21:12:22 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:22 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:22 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:12:22 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:22 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:22 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:22 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:22 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:12:22 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:22 localhost kernel: Call Trace:
Nov 20 21:12:22 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:22 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:22 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:12:22 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:22 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:22 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:23 localhost init: serial main process (19606) killed by HUP signal
Nov 20 21:12:24 localhost init: serial main process (19619) killed by HUP signal
Nov 20 21:12:24 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:24 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:12:24 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:24 localhost kernel: Call Trace:
Nov 20 21:12:24 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:24 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:24 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:12:24 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:24 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:24 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:24 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:24 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:12:24 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:24 localhost kernel: Call Trace:
Nov 20 21:12:24 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:24 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:24 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:12:24 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:24 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:24 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:24 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:24 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:12:24 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:24 localhost kernel: Call Trace:
Nov 20 21:12:24 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:24 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:24 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:12:24 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:24 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:24 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:24 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:24 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:12:24 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:24 localhost kernel: Call Trace:
Nov 20 21:12:24 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:24 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:24 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:12:24 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:24 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:24 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:25 localhost kerneloops: Submitted 1 kernel oopses to www.kerneloops.org
Nov 20 21:12:25 localhost init: serial main process (19632) killed by HUP signal
Nov 20 21:12:26 localhost init: serial main process (19645) killed by HUP signal
Nov 20 21:12:27 localhost init: serial main process (19658) killed by HUP signal
Nov 20 21:12:28 localhost init: serial main process (19671) killed by HUP signal
Nov 20 21:12:28 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:28 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:12:28 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:28 localhost kernel: Call Trace:
Nov 20 21:12:28 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:28 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:28 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:12:28 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:28 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:28 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:28 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:28 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:12:28 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:28 localhost kernel: Call Trace:
Nov 20 21:12:28 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:28 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:28 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:12:28 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:28 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:28 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:28 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:28 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:12:28 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:28 localhost kernel: Call Trace:
Nov 20 21:12:28 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:28 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:28 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:12:28 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:28 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:28 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:28 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:28 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:12:28 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:28 localhost kernel: Call Trace:
Nov 20 21:12:28 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:28 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:28 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:12:28 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:28 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:28 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:29 localhost init: serial main process (19684) killed by HUP signal
Nov 20 21:12:30 localhost init: serial main process (19697) killed by HUP signal
Nov 20 21:12:30 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:30 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:12:30 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:30 localhost kernel: Call Trace:
Nov 20 21:12:30 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:30 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:30 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:12:30 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:30 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:30 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:30 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:30 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:12:30 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:30 localhost kernel: Call Trace:
Nov 20 21:12:30 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:30 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:30 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:12:30 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:30 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:30 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:31 localhost init: serial main process (19710) killed by HUP signal
Nov 20 21:12:32 localhost init: serial main process (19723) killed by HUP signal
Nov 20 21:12:33 localhost init: serial main process (19736) killed by HUP signal
Nov 20 21:12:34 localhost init: serial main process (19749) killed by HUP signal
Nov 20 21:12:34 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:34 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:12:34 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:34 localhost kernel: Call Trace:
Nov 20 21:12:34 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:34 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:34 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:12:34 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:34 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:34 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:34 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:34 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:12:34 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:34 localhost kernel: Call Trace:
Nov 20 21:12:34 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:34 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:34 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:12:34 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:34 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:34 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:34 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:34 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:12:34 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:34 localhost kernel: Call Trace:
Nov 20 21:12:34 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:34 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:34 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:12:34 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:34 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:34 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:34 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:34 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:12:34 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:34 localhost kernel: Call Trace:
Nov 20 21:12:34 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:34 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:34 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:12:34 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:34 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:34 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:35 localhost init: serial main process (19762) killed by HUP signal
Nov 20 21:12:36 localhost init: serial main process (19775) killed by HUP signal
Nov 20 21:12:36 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:36 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:12:36 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:36 localhost kernel: Call Trace:
Nov 20 21:12:36 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:36 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:36 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:12:36 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:36 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:36 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:36 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:36 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:12:36 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:36 localhost kernel: Call Trace:
Nov 20 21:12:36 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:36 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:36 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:12:36 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:36 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:36 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:37 localhost init: serial main process (19788) killed by HUP signal
Nov 20 21:12:38 localhost init: serial main process (19801) killed by HUP signal
Nov 20 21:12:38 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:38 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:12:38 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:38 localhost kernel: Call Trace:
Nov 20 21:12:38 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:38 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:38 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:12:38 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:38 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:38 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:38 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:38 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:12:38 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:38 localhost kernel: Call Trace:
Nov 20 21:12:38 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:38 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:38 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:12:38 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:38 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:38 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:39 localhost init: serial main process (19814) killed by HUP signal
Nov 20 21:12:40 localhost init: serial main process (19827) killed by HUP signal
Nov 20 21:12:40 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:40 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:12:40 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:40 localhost kernel: Call Trace:
Nov 20 21:12:40 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:40 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:40 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:12:40 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:40 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:40 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:40 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:40 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:12:40 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:40 localhost kernel: Call Trace:
Nov 20 21:12:40 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:40 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:40 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:12:40 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:40 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:40 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:41 localhost init: serial main process (19840) killed by HUP signal
Nov 20 21:12:42 localhost init: serial main process (19853) killed by HUP signal
Nov 20 21:12:43 localhost init: serial main process (19866) killed by HUP signal
Nov 20 21:12:44 localhost init: serial main process (19879) killed by HUP signal
Nov 20 21:12:44 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:44 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:12:44 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:44 localhost kernel: Call Trace:
Nov 20 21:12:44 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:44 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:44 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:12:44 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:44 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:44 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:44 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:44 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:12:44 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:44 localhost kernel: Call Trace:
Nov 20 21:12:44 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:44 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:44 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:12:44 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:44 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:44 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:44 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:44 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:12:44 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:44 localhost kernel: Call Trace:
Nov 20 21:12:44 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:44 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:44 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:12:44 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:44 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:44 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:44 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:44 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:12:44 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:44 localhost kernel: Call Trace:
Nov 20 21:12:44 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:44 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:44 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:12:44 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:44 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:44 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:45 localhost init: serial main process (19892) killed by HUP signal
Nov 20 21:12:46 localhost init: serial main process (19905) killed by HUP signal
Nov 20 21:12:46 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:46 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:12:46 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:46 localhost kernel: Call Trace:
Nov 20 21:12:46 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:46 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:46 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:12:46 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:46 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:46 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:46 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:46 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:12:46 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:46 localhost kernel: Call Trace:
Nov 20 21:12:46 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:46 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:46 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:12:46 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:46 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:46 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:47 localhost init: serial main process (19918) killed by HUP signal
Nov 20 21:12:48 localhost init: serial main process (19931) killed by HUP signal
Nov 20 21:12:49 localhost init: serial main process (19944) killed by HUP signal
Nov 20 21:12:51 localhost init: serial main process (19957) killed by HUP signal
Nov 20 21:12:52 localhost init: serial main process (19970) killed by HUP signal
Nov 20 21:12:52 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:52 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:12:52 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:52 localhost kernel: Call Trace:
Nov 20 21:12:52 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:52 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:52 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:12:52 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:52 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:52 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:52 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:52 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:12:52 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:52 localhost kernel: Call Trace:
Nov 20 21:12:52 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:52 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:52 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:12:52 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:52 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:52 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:53 localhost init: serial main process (19983) killed by HUP signal
Nov 20 21:12:54 localhost init: serial main process (19996) killed by HUP signal
Nov 20 21:12:54 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:54 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:12:54 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:54 localhost kernel: Call Trace:
Nov 20 21:12:54 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:54 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:54 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:12:54 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:54 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:54 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:54 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:54 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:12:54 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:54 localhost kernel: Call Trace:
Nov 20 21:12:54 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:54 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:54 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:12:54 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:54 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:54 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:55 localhost init: serial main process (20009) killed by HUP signal
Nov 20 21:12:56 localhost init: serial main process (20022) killed by HUP signal
Nov 20 21:12:56 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:56 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:12:56 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:56 localhost kernel: Call Trace:
Nov 20 21:12:56 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:56 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:56 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:12:56 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:56 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:56 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:56 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:56 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:12:56 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:56 localhost kernel: Call Trace:
Nov 20 21:12:56 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:56 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:56 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:12:56 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:56 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:56 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:56 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:56 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:12:56 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:56 localhost kernel: Call Trace:
Nov 20 21:12:56 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:56 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:56 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:12:56 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:56 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:56 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:56 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:12:56 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:12:56 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:12:56 localhost kernel: Call Trace:
Nov 20 21:12:56 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:12:56 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:12:56 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:12:56 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:12:56 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:12:56 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:12:57 localhost init: serial main process (20035) killed by HUP signal
Nov 20 21:12:58 localhost init: serial main process (20048) killed by HUP signal
Nov 20 21:12:59 localhost init: serial main process (20061) killed by HUP signal
Nov 20 21:13:00 localhost init: serial main process (20074) killed by HUP signal
Nov 20 21:13:01 localhost init: serial main process (20087) killed by HUP signal
Nov 20 21:13:02 localhost init: serial main process (20100) killed by HUP signal
Nov 20 21:13:02 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:13:02 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:13:02 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:13:02 localhost kernel: Call Trace:
Nov 20 21:13:02 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:13:02 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:13:02 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:13:02 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:13:02 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:13:02 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:13:02 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:13:02 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:13:02 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:13:02 localhost kernel: Call Trace:
Nov 20 21:13:02 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:13:02 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:13:02 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:13:02 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:13:02 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:13:02 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:13:03 localhost init: serial main process (20113) killed by HUP signal
Nov 20 21:13:04 localhost init: serial main process (20126) killed by HUP signal
Nov 20 21:13:05 localhost init: serial main process (20139) killed by HUP signal
Nov 20 21:13:06 localhost init: serial main process (20152) killed by HUP signal
Nov 20 21:13:07 localhost init: serial main process (20165) killed by HUP signal
Nov 20 21:13:08 localhost init: serial main process (20178) killed by HUP signal
Nov 20 21:13:08 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:13:08 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:13:08 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:13:08 localhost kernel: Call Trace:
Nov 20 21:13:08 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:13:08 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:13:08 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:13:08 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:13:08 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:13:08 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:13:08 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:13:08 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:13:08 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:13:08 localhost kernel: Call Trace:
Nov 20 21:13:08 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:13:08 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:13:08 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:13:08 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:13:08 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:13:08 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:13:09 localhost init: serial main process (20191) killed by HUP signal
Nov 20 21:13:10 localhost init: serial main process (20204) killed by HUP signal
Nov 20 21:13:10 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:13:10 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:13:10 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:13:10 localhost kernel: Call Trace:
Nov 20 21:13:10 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:13:10 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:13:10 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:13:10 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:13:10 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:13:10 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:13:10 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:13:10 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:13:10 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:13:10 localhost kernel: Call Trace:
Nov 20 21:13:10 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:13:10 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:13:10 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:13:10 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:13:10 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:13:10 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:13:10 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:13:10 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:13:10 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:13:10 localhost kernel: Call Trace:
Nov 20 21:13:10 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:13:10 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:13:10 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:13:10 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:13:10 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:13:10 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:13:10 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:13:10 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:13:10 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:13:10 localhost kernel: Call Trace:
Nov 20 21:13:10 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:13:10 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:13:10 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:13:10 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:13:10 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:13:10 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:13:11 localhost init: serial main process (20217) killed by HUP signal
Nov 20 21:13:12 localhost init: serial main process (20230) killed by HUP signal
Nov 20 21:13:13 localhost init: serial main process (20243) killed by HUP signal
Nov 20 21:13:14 localhost init: serial main process (20256) killed by HUP signal
Nov 20 21:13:14 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:13:14 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:13:14 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:13:14 localhost kernel: Call Trace:
Nov 20 21:13:14 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:13:14 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:13:14 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:13:14 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:13:14 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:13:14 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:13:14 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:13:14 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:13:14 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:13:14 localhost kernel: Call Trace:
Nov 20 21:13:14 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:13:14 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:13:14 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:13:14 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:13:14 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:13:14 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:13:15 localhost init: serial main process (20269) killed by HUP signal
Nov 20 21:13:16 localhost init: serial main process (20282) killed by HUP signal
Nov 20 21:13:17 localhost init: serial main process (20295) killed by HUP signal
Nov 20 21:13:18 localhost init: serial main process (20308) killed by HUP signal
Nov 20 21:13:18 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:13:18 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:13:18 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:13:18 localhost kernel: Call Trace:
Nov 20 21:13:18 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:13:18 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:13:18 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:13:18 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:13:18 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:13:18 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:13:18 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:13:18 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:13:18 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:13:18 localhost kernel: Call Trace:
Nov 20 21:13:18 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:13:18 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:13:18 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:13:18 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:13:18 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:13:18 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:13:19 localhost init: serial main process (20321) killed by HUP signal
Nov 20 21:13:20 localhost init: serial main process (20334) killed by HUP signal
Nov 20 21:13:21 localhost init: serial main process (20347) killed by HUP signal
Nov 20 21:13:22 localhost init: serial main process (20360) killed by HUP signal
Nov 20 21:13:22 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:13:22 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:13:22 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:13:22 localhost kernel: Call Trace:
Nov 20 21:13:22 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:13:22 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:13:22 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:13:22 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:13:22 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:13:22 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:13:22 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:13:22 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:13:22 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:13:22 localhost kernel: Call Trace:
Nov 20 21:13:22 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:13:22 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:13:22 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:13:22 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:13:22 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:13:22 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:13:23 localhost init: serial main process (20373) killed by HUP signal
Nov 20 21:13:24 localhost init: serial main process (20386) killed by HUP signal
Nov 20 21:13:25 localhost init: serial main process (20399) killed by HUP signal
Nov 20 21:13:26 localhost init: serial main process (20412) killed by HUP signal
Nov 20 21:13:26 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:13:26 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:13:26 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:13:26 localhost kernel: Call Trace:
Nov 20 21:13:26 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:13:26 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:13:26 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:13:26 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:13:26 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:13:26 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:13:26 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:13:26 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:13:26 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:13:26 localhost kernel: Call Trace:
Nov 20 21:13:26 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:13:26 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:13:26 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:13:26 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:13:26 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:13:26 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:13:26 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:13:26 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:13:26 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:13:26 localhost kernel: Call Trace:
Nov 20 21:13:26 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:13:26 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:13:26 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:13:26 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:13:26 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:13:26 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:13:26 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:13:26 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:13:26 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:13:26 localhost kernel: Call Trace:
Nov 20 21:13:26 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:13:26 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:13:26 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:13:26 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:13:26 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:13:26 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:13:26 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:13:26 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:13:26 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:13:26 localhost kernel: Call Trace:
Nov 20 21:13:26 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:13:26 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:13:26 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:13:26 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:13:26 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:13:26 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:13:26 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:13:26 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:13:26 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:13:26 localhost kernel: Call Trace:
Nov 20 21:13:26 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:13:26 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:13:26 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:13:26 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:13:26 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:13:26 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:13:27 localhost init: serial main process (20425) killed by HUP signal
Nov 20 21:13:28 localhost init: serial main process (20438) killed by HUP signal
Nov 20 21:13:28 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:13:28 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:13:28 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:13:28 localhost kernel: Call Trace:
Nov 20 21:13:28 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:13:28 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:13:28 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:13:28 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:13:28 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:13:28 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:13:28 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:13:28 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:13:28 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:13:28 localhost kernel: Call Trace:
Nov 20 21:13:28 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:13:28 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:13:28 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:13:28 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:13:28 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:13:28 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:13:29 localhost init: serial main process (20451) killed by HUP signal
Nov 20 21:13:30 localhost init: serial main process (20464) killed by HUP signal
Nov 20 21:13:31 localhost init: serial main process (20477) killed by HUP signal
Nov 20 21:13:32 localhost init: serial main process (20490) killed by HUP signal
Nov 20 21:13:32 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:13:32 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:13:32 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:13:32 localhost kernel: Call Trace:
Nov 20 21:13:32 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:13:32 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:13:32 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:13:32 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:13:32 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:13:32 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:13:32 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:13:32 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:13:32 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:13:32 localhost kernel: Call Trace:
Nov 20 21:13:32 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:13:32 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:13:32 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:13:32 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:13:32 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:13:32 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:13:33 localhost init: serial main process (20503) killed by HUP signal
Nov 20 21:13:34 localhost init: serial main process (20516) killed by HUP signal
Nov 20 21:13:34 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:13:34 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:13:34 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:13:34 localhost kernel: Call Trace:
Nov 20 21:13:34 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:13:34 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:13:34 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:13:34 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:13:34 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:13:34 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:13:34 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:13:34 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:13:34 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:13:34 localhost kernel: Call Trace:
Nov 20 21:13:34 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:13:34 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:13:34 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:13:34 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:13:34 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:13:34 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:13:35 localhost init: serial main process (20529) killed by HUP signal
Nov 20 21:13:36 localhost init: serial main process (20542) killed by HUP signal
Nov 20 21:13:37 localhost init: serial main process (20555) killed by HUP signal
Nov 20 21:13:38 localhost init: serial main process (20568) killed by HUP signal
Nov 20 21:13:39 localhost init: serial main process (20581) killed by HUP signal
Nov 20 21:13:40 localhost init: serial main process (20594) killed by HUP signal
Nov 20 21:13:41 localhost init: serial main process (20607) killed by HUP signal
Nov 20 21:13:42 localhost init: serial main process (20620) killed by HUP signal
Nov 20 21:13:42 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:13:42 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:13:42 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:13:42 localhost kernel: Call Trace:
Nov 20 21:13:42 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:13:42 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:13:42 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:13:42 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:13:42 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:13:42 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:13:42 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:13:42 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:13:42 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:13:42 localhost kernel: Call Trace:
Nov 20 21:13:42 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:13:42 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:13:42 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:13:42 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:13:42 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:13:42 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:13:42 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:13:42 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:13:42 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:13:42 localhost kernel: Call Trace:
Nov 20 21:13:42 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:13:42 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:13:42 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:13:42 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:13:42 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:13:42 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:13:42 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:13:42 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:13:42 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:13:42 localhost kernel: Call Trace:
Nov 20 21:13:42 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:13:42 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:13:42 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:13:42 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:13:42 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:13:42 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:13:43 localhost init: serial main process (20633) killed by HUP signal
Nov 20 21:13:44 localhost init: serial main process (20646) killed by HUP signal
Nov 20 21:13:45 localhost init: serial main process (20659) killed by HUP signal
Nov 20 21:13:46 localhost init: serial main process (20672) killed by HUP signal
Nov 20 21:13:47 localhost init: serial main process (20685) killed by HUP signal
Nov 20 21:13:48 localhost init: serial main process (20698) killed by HUP signal
Nov 20 21:13:50 localhost init: serial main process (20711) killed by HUP signal
Nov 20 21:13:50 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:13:50 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:13:50 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:13:50 localhost kernel: Call Trace:
Nov 20 21:13:50 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:13:50 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:13:50 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:13:50 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:13:50 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:13:50 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:13:50 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:13:50 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:13:50 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:13:50 localhost kernel: Call Trace:
Nov 20 21:13:50 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:13:50 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:13:50 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:13:50 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:13:50 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:13:50 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:13:50 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:13:50 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:13:50 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:13:50 localhost kernel: Call Trace:
Nov 20 21:13:50 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:13:50 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:13:50 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:13:50 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:13:50 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:13:50 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:13:50 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:13:50 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:13:50 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:13:50 localhost kernel: Call Trace:
Nov 20 21:13:50 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:13:50 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:13:50 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:13:50 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:13:50 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:13:50 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:13:51 localhost init: serial main process (20724) killed by HUP signal
Nov 20 21:13:52 localhost init: serial main process (20737) killed by HUP signal
Nov 20 21:13:53 localhost init: serial main process (20750) killed by HUP signal
Nov 20 21:13:54 localhost init: serial main process (20763) killed by HUP signal
Nov 20 21:13:55 localhost init: serial main process (20776) killed by HUP signal
Nov 20 21:13:56 localhost init: serial main process (20789) killed by HUP signal
Nov 20 21:13:57 localhost init: serial main process (20802) killed by HUP signal
Nov 20 21:13:58 localhost init: serial main process (20815) killed by HUP signal
Nov 20 21:13:58 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:13:58 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:13:58 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:13:58 localhost kernel: Call Trace:
Nov 20 21:13:58 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:13:58 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:13:58 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:13:58 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:13:58 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:13:58 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:13:58 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:13:58 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:13:58 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:13:58 localhost kernel: Call Trace:
Nov 20 21:13:58 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:13:58 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:13:58 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:13:58 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:13:58 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:13:58 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:13:59 localhost init: serial main process (20828) killed by HUP signal
Nov 20 21:14:00 localhost init: serial main process (20841) killed by HUP signal
Nov 20 21:14:00 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:14:00 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:14:00 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:14:00 localhost kernel: Call Trace:
Nov 20 21:14:00 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:14:00 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:14:00 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:14:00 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:14:00 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:14:00 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:14:00 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:14:00 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:14:00 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:14:00 localhost kernel: Call Trace:
Nov 20 21:14:00 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:14:00 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:14:00 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:14:00 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:14:00 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:14:00 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:14:01 localhost init: serial main process (20854) killed by HUP signal
Nov 20 21:14:02 localhost init: serial main process (20867) killed by HUP signal
Nov 20 21:14:02 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:14:02 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:14:02 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:14:02 localhost kernel: Call Trace:
Nov 20 21:14:02 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:14:02 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:14:02 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:14:02 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:14:02 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:14:02 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:14:02 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:14:02 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:14:02 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:14:02 localhost kernel: Call Trace:
Nov 20 21:14:02 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:14:02 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:14:02 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:14:02 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:14:02 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:14:02 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:14:03 localhost init: serial main process (20880) killed by HUP signal
Nov 20 21:14:04 localhost init: serial main process (20893) killed by HUP signal
Nov 20 21:14:05 localhost init: serial main process (20906) killed by HUP signal
Nov 20 21:14:06 localhost init: serial main process (20919) killed by HUP signal
Nov 20 21:14:06 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:14:06 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:14:06 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:14:06 localhost kernel: Call Trace:
Nov 20 21:14:06 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:14:06 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:14:06 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:14:06 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:14:06 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:14:06 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:14:06 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:14:06 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:14:06 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:14:06 localhost kernel: Call Trace:
Nov 20 21:14:06 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:14:06 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:14:06 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:14:06 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:14:06 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:14:06 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:14:07 localhost init: serial main process (20932) killed by HUP signal
Nov 20 21:14:08 localhost init: serial main process (20945) killed by HUP signal
Nov 20 21:14:09 localhost init: serial main process (20958) killed by HUP signal
Nov 20 21:14:10 localhost init: serial main process (20971) killed by HUP signal
Nov 20 21:14:11 localhost init: serial main process (20984) killed by HUP signal
Nov 20 21:14:12 localhost init: serial main process (20997) killed by HUP signal
Nov 20 21:14:13 localhost init: serial main process (21010) killed by HUP signal
Nov 20 21:14:14 localhost init: serial main process (21023) killed by HUP signal
Nov 20 21:14:14 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:14:14 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:14:14 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:14:14 localhost kernel: Call Trace:
Nov 20 21:14:14 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:14:14 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:14:14 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:14:14 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:14:14 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:14:14 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:14:14 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:14:14 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:14:14 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:14:14 localhost kernel: Call Trace:
Nov 20 21:14:14 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:14:14 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:14:14 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:14:14 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:14:14 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:14:14 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:14:14 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:14:14 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:14:14 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:14:14 localhost kernel: Call Trace:
Nov 20 21:14:14 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:14:14 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:14:14 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:14:14 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:14:14 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:14:14 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:14:14 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:14:14 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:14:14 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:14:14 localhost kernel: Call Trace:
Nov 20 21:14:14 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:14:14 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:14:14 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:14:14 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:14:14 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:14:14 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:14:15 localhost init: serial main process (21036) killed by HUP signal
Nov 20 21:14:16 localhost init: serial main process (21049) killed by HUP signal
Nov 20 21:14:16 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:14:16 localhost kernel: caller is __schedule+0xe/0x7d4
Nov 20 21:14:16 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:14:16 localhost kernel: Call Trace:
Nov 20 21:14:16 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:14:16 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:14:16 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
Nov 20 21:14:16 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:14:16 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:14:16 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:14:16 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
Nov 20 21:14:16 localhost kernel: caller is __schedule+0x93/0x7d4
Nov 20 21:14:16 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
Nov 20 21:14:16 localhost kernel: Call Trace:
Nov 20 21:14:16 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
Nov 20 21:14:16 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
Nov 20 21:14:16 localhost kernel: [<c06dc70e>] __schedule+0x93/0x7d4
Nov 20 21:14:16 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
Nov 20 21:14:16 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
Nov 20 21:14:16 localhost kernel: [<c040338a>] work_resched+0x5/0x19
Nov 20 21:14:17 localhost init: serial main process (21062) killed by HUP signal
Nov 20 21:14:18 localhost init: serial main process (21075) killed by HUP signal
Nov 20 21:14:19 localhost init: serial main process (21088) killed by HUP signal
Nov 20 21:14:20 localhost init: serial main process (21101) killed by HUP signal
Nov 20 21:14:21 localhost init: serial main process (21114) killed by HUP signal
Nov 20 21:14:22 localhost init: serial main process (21127) killed by HUP signal
Nov 20 21:14:23 localhost init: serial main process (21140) killed by HUP signal
Nov 20 21:14:24 localhost init: serial main process (21153) killed by HUP signal
Nov 20 21:14:25 localhost init: serial main process (21166) killed by HUP signal
Nov 20 21:14:26 localhost init: serial main process (21179) killed by HUP signal
Nov 20 21:14:27 localhost init: serial main process (21192) killed by HUP signal
Nov 20 21:14:28 localhost init: serial main process (21205) killed by HUP signal
Nov 20 21:14:29 localhost init: serial main process (21218) killed by HUP signal
Nov 20 21:14:30 localhost init: serial main process (21231) killed by HUP signal
Nov 20 21:14:31 localhost init: serial main process (21244) killed by HUP signal
Nov 20 21:14:32 localhost init: serial main process (21257) killed by HUP signal
Nov 20 21:14:33 localhost init: serial main process (21270) killed by HUP signal
Nov 20 21:14:34 localhost init: serial main process (21283) killed by HUP signal
Nov 20 21:14:35 localhost init: serial main process (21296) killed by HUP signal
Nov 20 21:14:36 localhost init: serial main process (21309) killed by HUP signal
Nov 20 21:14:37 localhost init: serial main process (21322) killed by HUP signal
Nov 20 21:14:38 localhost init: serial main process (21335) killed by HUP signal
Nov 20 21:14:39 localhost init: serial main process (21348) killed by HUP signal
Nov 20 21:14:40 localhost init: serial main process (21361) killed by HUP signal
Nov 20 21:14:41 localhost init: serial main process (21374) killed by HUP signal
Nov 20 21:14:42 localhost init: serial main process (21387) killed by HUP signal
Nov 20 21:14:43 localhost init: serial main process (21400) killed by HUP signal
Nov 20 21:14:44 localhost init: serial main process (21413) killed by HUP signal
Nov 20 21:14:45 localhost init: serial main process (21426) killed by HUP signal
Nov 20 21:14:46 localhost init: serial main process (21439) killed by HUP signal
Nov 20 21:14:47 localhost init: serial main process (21452) killed by HUP signal
Nov 20 21:14:48 localhost init: serial main process (21465) killed by HUP signal
Nov 20 21:18:29 localhost kernel: imklog 3.21.3, log source = /proc/kmsg started.
Nov 20 21:18:29 localhost kernel: Initializing cgroup subsys cpuset
Nov 20 21:18:29 localhost kernel: Linux version 2.6.31.6-rt19 (root@mgwtest) (gcc version 4.3.2 20081105 (Red Hat 4.3.2-7) (GCC) ) #1 SMP PREEMPT RT Wed Nov 18 22:20:20 CST 2009
Nov 20 21:18:29 localhost kernel: KERNEL supported cpus:
Nov 20 21:18:29 localhost kernel:  Intel GenuineIntel
Nov 20 21:18:29 localhost kernel:  AMD AuthenticAMD
Nov 20 21:18:29 localhost kernel:  NSC Geode by NSC
Nov 20 21:18:29 localhost kernel:  Cyrix CyrixInstead
Nov 20 21:18:29 localhost kernel:  Centaur CentaurHauls
Nov 20 21:18:29 localhost kernel:  Transmeta GenuineTMx86
Nov 20 21:18:29 localhost kernel:  Transmeta TransmetaCPU
Nov 20 21:18:29 localhost kernel:  UMC UMC UMC UMC
Nov 20 21:18:29 localhost kernel: BIOS-provided physical RAM map:
Nov 20 21:18:29 localhost kernel: BIOS-e820: 0000000000000000 - 000000000009a000 (usable)
Nov 20 21:18:29 localhost kernel: BIOS-e820: 00000000000f0000 - 0000000000100000 (reserved)
Nov 20 21:18:29 localhost kernel: BIOS-e820: 0000000000100000 - 000000007bbffc00 (usable)
Nov 20 21:18:29 localhost kernel: BIOS-e820: 000000007bbffc00 - 000000007bc53c00 (ACPI NVS)
Nov 20 21:18:29 localhost kernel: BIOS-e820: 000000007bc53c00 - 000000007bc55c00 (ACPI data)
Nov 20 21:18:29 localhost kernel: BIOS-e820: 000000007bc55c00 - 000000007e00000el.org.





^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: help needed, 2.6.31.6-rt19 hang with network user app
  2009-11-21  3:56   ` Leyendecker, Robert
@ 2009-11-21  8:25     ` Nikita V. Youshchenko
  2009-11-21 16:20       ` Leyendecker, Robert
  2009-11-27 19:43     ` Thomas Gleixner
  1 sibling, 1 reply; 10+ messages in thread
From: Nikita V. Youshchenko @ 2009-11-21  8:25 UTC (permalink / raw)
  To: Leyendecker, Robert; +Cc: rt-users

> > Does host A have a serial port? If yes, connect that to another host
> > using a null-modem cable, boot host A with serial console (boot arg
> > console=ttyS0,15200), and use that to extract kernel crash message.
> > Then post that to this list.
>
> unfortunately - nothing shows up in the serial log after the normal boot
> spew. I do see some sort of cr/lf every second for a while.

Of course that should be console=ttyS0,115200
And on other side serial communication software should be configured
to use 115200 8n1 with no flow control.

> Nov 20 21:12:00 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
> Nov 20 21:12:00 localhost kernel: caller is  __schedule+0xe/0x7d4 Nov 20 21:12:00 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
> Nov 20 21:12:00 localhost kernel: Call Trace:
> Nov 20 21:12:00 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
> Nov 20 21:12:00 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
> Nov 20 21:12:00 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
> Nov 20 21:12:00 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
> Nov 20 21:12:00 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
> Nov 20 21:12:00 localhost kernel: [<c040338a>] work_resched+0x5/0x19

Hopely somebody on list will be able to comment on this.


^ permalink raw reply	[flat|nested] 10+ messages in thread

* RE: help needed, 2.6.31.6-rt19 hang with network user app
  2009-11-21  8:25     ` Nikita V. Youshchenko
@ 2009-11-21 16:20       ` Leyendecker, Robert
  2009-11-23 15:34         ` Leyendecker, Robert
  0 siblings, 1 reply; 10+ messages in thread
From: Leyendecker, Robert @ 2009-11-21 16:20 UTC (permalink / raw)
  To: Nikita V. Youshchenko; +Cc: rt-users



> -----Original Message-----
> From: Nikita V. Youshchenko [mailto:yoush@cs.msu.su]
> Sent: Saturday, November 21, 2009 2:26 AM
> To: Leyendecker, Robert
> Cc: rt-users
> Subject: Re: help needed, 2.6.31.6-rt19 hang with network user app
> 
> > > Does host A have a serial port? If yes, connect that to another
> host
> > > using a null-modem cable, boot host A with serial console (boot arg
> > > console=ttyS0,15200), and use that to extract kernel crash message.
> > > Then post that to this list.
> >
> > unfortunately - nothing shows up in the serial log after the normal
> boot
> > spew. I do see some sort of cr/lf every second for a while.
> 
> Of course that should be console=ttyS0,115200
> And on other side serial communication software should be configured
> to use 115200 8n1 with no flow control.
No problem, I caught that. During boot, console messages are displayed in tty and it looks normal, after boot tty is quiet. I'll look at it some more because it would be very nice to have the console working.  Are the regular tty HUPs a result of failed auto baud detect?
> 
> > Nov 20 21:12:00 localhost kernel: BUG: using smp_processor_id() in
> preemptible [00000000] code: smash/6801
> > Nov 20 21:12:00 localhost kernel: caller is  __schedule+0xe/0x7d4 Nov
> 20 21:12:00 localhost kernel: Pid: 6801, comm: smash Not tainted
> 2.6.31.6-rt19 #1
> > Nov 20 21:12:00 localhost kernel: Call Trace:
> > Nov 20 21:12:00 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
> > Nov 20 21:12:00 localhost kernel: [<c05499a6>]
> debug_smp_processor_id+0xa6/0xbc
> > Nov 20 21:12:00 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
> > Nov 20 21:12:00 localhost kernel: [<c046621f>] ?
> audit_syscall_exit+0xfa/0x10f
> > Nov 20 21:12:00 localhost kernel: [<c040a955>] ?
> syscall_trace_leave+0xc8/0xef
> > Nov 20 21:12:00 localhost kernel: [<c040338a>] work_resched+0x5/0x19
> 
> Hopely somebody on list will be able to comment on this.


^ permalink raw reply	[flat|nested] 10+ messages in thread

* RE: help needed, 2.6.31.6-rt19 hang with network user app
  2009-11-21 16:20       ` Leyendecker, Robert
@ 2009-11-23 15:34         ` Leyendecker, Robert
  2009-11-24 15:47           ` Leyendecker, Robert
  0 siblings, 1 reply; 10+ messages in thread
From: Leyendecker, Robert @ 2009-11-23 15:34 UTC (permalink / raw)
  To: Leyendecker, Robert, Nikita V. Youshchenko; +Cc: rt-users



> -----Original Message-----
> From: linux-rt-users-owner@vger.kernel.org [mailto:linux-rt-users-
> owner@vger.kernel.org] On Behalf Of Leyendecker, Robert
> Sent: Saturday, November 21, 2009 10:21 AM
> To: Nikita V. Youshchenko
> Cc: rt-users
> Subject: RE: help needed, 2.6.31.6-rt19 hang with network user app
> 
> 
> 
> > -----Original Message-----
> > From: Nikita V. Youshchenko [mailto:yoush@cs.msu.su]
> > Sent: Saturday, November 21, 2009 2:26 AM
> > To: Leyendecker, Robert
> > Cc: rt-users
> > Subject: Re: help needed, 2.6.31.6-rt19 hang with network user app
> >
> > > > Does host A have a serial port? If yes, connect that to another
> > host
> > > > using a null-modem cable, boot host A with serial console (boot
> arg
> > > > console=ttyS0,15200), and use that to extract kernel crash
> message.
> > > > Then post that to this list.
> > >
> > > unfortunately - nothing shows up in the serial log after the normal
> > boot
> > > spew. I do see some sort of cr/lf every second for a while.
> >
> > Of course that should be console=ttyS0,115200
> > And on other side serial communication software should be configured
> > to use 115200 8n1 with no flow control.
> No problem, I caught that. During boot, console messages are displayed
> in tty and it looks normal, after boot tty is quiet. I'll look at it
> some more because it would be very nice to have the console working.
> Are the regular tty HUPs a result of failed auto baud detect?
> >
> > > Nov 20 21:12:00 localhost kernel: BUG: using smp_processor_id() in
> > preemptible [00000000] code: smash/6801
> > > Nov 20 21:12:00 localhost kernel: caller is  __schedule+0xe/0x7d4
> Nov
> > 20 21:12:00 localhost kernel: Pid: 6801, comm: smash Not tainted
> > 2.6.31.6-rt19 #1
> > > Nov 20 21:12:00 localhost kernel: Call Trace:
> > > Nov 20 21:12:00 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
> > > Nov 20 21:12:00 localhost kernel: [<c05499a6>]
> > debug_smp_processor_id+0xa6/0xbc
> > > Nov 20 21:12:00 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
> > > Nov 20 21:12:00 localhost kernel: [<c046621f>] ?
> > audit_syscall_exit+0xfa/0x10f
> > > Nov 20 21:12:00 localhost kernel: [<c040a955>] ?
> > syscall_trace_leave+0xc8/0xef
> > > Nov 20 21:12:00 localhost kernel: [<c040338a>]
> work_resched+0x5/0x19
> >
> > Hopely somebody on list will be able to comment on this.
> 

One other piece of information - from program start to program start, the irq-net-rx is taking between 0% and 20% CPU. I can start the program and top report 50% CPU loading and net-rx at 20%. Kill the app restart and I get 1%/0% (in fact, net-rx never makes it to top of list). Kill the app and restart and I get 80%/10% and net-rx is pegged at top of list, etc, etc. 

When top reports CPU load at 1% and net-rx at 0%, this seems to give me my longest run time without crash (I don't think I've recorded one in this state), however it might take 20 starts or more to get into this state. So there is some sort of phase relationship. Whether or not the app is receiving data at time of program start doesn't seem to have any effect on the variance reported by top. Seems random.

Open question, should I move this post to LKML or is it better to do some additional troubleshooting here first?

> --
> To unsubscribe from this list: send the line "unsubscribe linux-rt-
> users" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at  http://vger.kernel.org/majordomo-info.html

^ permalink raw reply	[flat|nested] 10+ messages in thread

* RE: help needed, 2.6.31.6-rt19 hang with network user app
  2009-11-23 15:34         ` Leyendecker, Robert
@ 2009-11-24 15:47           ` Leyendecker, Robert
  0 siblings, 0 replies; 10+ messages in thread
From: Leyendecker, Robert @ 2009-11-24 15:47 UTC (permalink / raw)
  To: rt-users

> > >
> > > > Nov 20 21:12:00 localhost kernel: BUG: using smp_processor_id()
> in
> > > preemptible [00000000] code: smash/6801
> > > > Nov 20 21:12:00 localhost kernel: caller is  __schedule+0xe/0x7d4
> > Nov
> > > 20 21:12:00 localhost kernel: Pid: 6801, comm: smash Not tainted
> > > 2.6.31.6-rt19 #1
> > > > Nov 20 21:12:00 localhost kernel: Call Trace:
> > > > Nov 20 21:12:00 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
> > > > Nov 20 21:12:00 localhost kernel: [<c05499a6>]
> > > debug_smp_processor_id+0xa6/0xbc
> > > > Nov 20 21:12:00 localhost kernel: [<c06dc689>]
> __schedule+0xe/0x7d4
> > > > Nov 20 21:12:00 localhost kernel: [<c046621f>] ?
> > > audit_syscall_exit+0xfa/0x10f
> > > > Nov 20 21:12:00 localhost kernel: [<c040a955>] ?
> > > syscall_trace_leave+0xc8/0xef
> > > > Nov 20 21:12:00 localhost kernel: [<c040338a>]
> > work_resched+0x5/0x19
> > >
> > > Hopely somebody on list will be able to comment on this.
> >
> 

Re-posted to LKML http://lkml.org/lkml/2009/11/23/548 and opened a bug in Fedora Bugzilla 540961.

^ permalink raw reply	[flat|nested] 10+ messages in thread

* RE: help needed, 2.6.31.6-rt19 hang with network user app
  2009-11-21  3:56   ` Leyendecker, Robert
  2009-11-21  8:25     ` Nikita V. Youshchenko
@ 2009-11-27 19:43     ` Thomas Gleixner
  2009-11-29  4:43       ` Leyendecker, Robert
  1 sibling, 1 reply; 10+ messages in thread
From: Thomas Gleixner @ 2009-11-27 19:43 UTC (permalink / raw)
  To: Leyendecker, Robert; +Cc: Nikita V. Youshchenko, rt-users

On Fri, 20 Nov 2009, Leyendecker, Robert wrote:

> Here is what was in the log/messages - I assume this is what was
> sent to kernel.org.  Host B is reporting destination unreachables at
> time of freeze.  Hope this log is useful. I have the full log from
> start of boot I can zip it up if you would like. At the bottom you
> can see where it is rebooting due to power cycle.

> Nov 20 21:12:00 localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: smash/6801
> Nov 20 21:12:00 localhost kernel: caller is __schedule+0xe/0x7d4
> Nov 20 21:12:00 localhost kernel: Pid: 6801, comm: smash Not tainted 2.6.31.6-rt19 #1
> Nov 20 21:12:00 localhost kernel: Call Trace:
> Nov 20 21:12:00 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
> Nov 20 21:12:00 localhost kernel: [<c05499a6>] debug_smp_processor_id+0xa6/0xbc
> Nov 20 21:12:00 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
> Nov 20 21:12:00 localhost kernel: [<c046621f>] ? audit_syscall_exit+0xfa/0x10f
> Nov 20 21:12:00 localhost kernel: [<c040a955>] ? syscall_trace_leave+0xc8/0xef
> Nov 20 21:12:00 localhost kernel: [<c040338a>] work_resched+0x5/0x19

Hmm, that comes from the low level code. We should have interrupts
disabled here, but I have a hard time to figure out the call path in
the ASM maze of entry_32.S. Still investigating.

Thanks,

	tglx


^ permalink raw reply	[flat|nested] 10+ messages in thread

* RE: help needed, 2.6.31.6-rt19 hang with network user app
  2009-11-27 19:43     ` Thomas Gleixner
@ 2009-11-29  4:43       ` Leyendecker, Robert
  2009-12-16  1:55         ` Leyendecker, Robert
  0 siblings, 1 reply; 10+ messages in thread
From: Leyendecker, Robert @ 2009-11-29  4:43 UTC (permalink / raw)
  To: Thomas Gleixner; +Cc: Nikita V. Youshchenko, rt-users



> -----Original Message-----
> From: Thomas Gleixner [mailto:tglx@linutronix.de]
> Sent: Friday, November 27, 2009 1:43 PM
> To: Leyendecker, Robert
> Cc: Nikita V. Youshchenko; rt-users
> Subject: RE: help needed, 2.6.31.6-rt19 hang with network user app
> 
> On Fri, 20 Nov 2009, Leyendecker, Robert wrote:
> 
> > Here is what was in the log/messages - I assume this is what was
> > sent to kernel.org.  Host B is reporting destination unreachables at
> > time of freeze.  Hope this log is useful. I have the full log from
> > start of boot I can zip it up if you would like. At the bottom you
> > can see where it is rebooting due to power cycle.
> 
> > Nov 20 21:12:00 localhost kernel: BUG: using smp_processor_id() in
> preemptible [00000000] code: smash/6801
> > Nov 20 21:12:00 localhost kernel: caller is __schedule+0xe/0x7d4
> > Nov 20 21:12:00 localhost kernel: Pid: 6801, comm: smash Not tainted
> 2.6.31.6-rt19 #1
> > Nov 20 21:12:00 localhost kernel: Call Trace:
> > Nov 20 21:12:00 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
> > Nov 20 21:12:00 localhost kernel: [<c05499a6>]
> debug_smp_processor_id+0xa6/0xbc
> > Nov 20 21:12:00 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
> > Nov 20 21:12:00 localhost kernel: [<c046621f>] ?
> audit_syscall_exit+0xfa/0x10f
> > Nov 20 21:12:00 localhost kernel: [<c040a955>] ?
> syscall_trace_leave+0xc8/0xef
> > Nov 20 21:12:00 localhost kernel: [<c040338a>] work_resched+0x5/0x19
> 
> Hmm, that comes from the low level code. We should have interrupts
> disabled here, but I have a hard time to figure out the call path in
> the ASM maze of entry_32.S. Still investigating.
> 
> Thanks,
> 
> 	tglx

Thomas-

Thank you for the help on this,

-Bob


^ permalink raw reply	[flat|nested] 10+ messages in thread

* RE: help needed, 2.6.31.6-rt19 hang with network user app
  2009-11-29  4:43       ` Leyendecker, Robert
@ 2009-12-16  1:55         ` Leyendecker, Robert
  0 siblings, 0 replies; 10+ messages in thread
From: Leyendecker, Robert @ 2009-12-16  1:55 UTC (permalink / raw)
  To: Leyendecker, Robert, Thomas Gleixner; +Cc: Nikita V. Youshchenko, rt-users



> -----Original Message-----
> From: linux-rt-users-owner@vger.kernel.org [mailto:linux-rt-users-
> owner@vger.kernel.org] On Behalf Of Leyendecker, Robert
> Sent: Saturday, November 28, 2009 10:44 PM
> To: Thomas Gleixner
> Cc: Nikita V. Youshchenko; rt-users
> Subject: RE: help needed, 2.6.31.6-rt19 hang with network user app
> 
> 
> 
> > -----Original Message-----
> > From: Thomas Gleixner [mailto:tglx@linutronix.de]
> > Sent: Friday, November 27, 2009 1:43 PM
> > To: Leyendecker, Robert
> > Cc: Nikita V. Youshchenko; rt-users
> > Subject: RE: help needed, 2.6.31.6-rt19 hang with network user app
> >
> > On Fri, 20 Nov 2009, Leyendecker, Robert wrote:
> >
> > > Here is what was in the log/messages - I assume this is what was
> > > sent to kernel.org.  Host B is reporting destination unreachables
> at
> > > time of freeze.  Hope this log is useful. I have the full log from
> > > start of boot I can zip it up if you would like. At the bottom you
> > > can see where it is rebooting due to power cycle.
> >
> > > Nov 20 21:12:00 localhost kernel: BUG: using smp_processor_id() in
> > preemptible [00000000] code: smash/6801
> > > Nov 20 21:12:00 localhost kernel: caller is __schedule+0xe/0x7d4
> > > Nov 20 21:12:00 localhost kernel: Pid: 6801, comm: smash Not
> tainted
> > 2.6.31.6-rt19 #1
> > > Nov 20 21:12:00 localhost kernel: Call Trace:
> > > Nov 20 21:12:00 localhost kernel: [<c06dc3df>] ? printk+0xf/0x18
> > > Nov 20 21:12:00 localhost kernel: [<c05499a6>]
> > debug_smp_processor_id+0xa6/0xbc
> > > Nov 20 21:12:00 localhost kernel: [<c06dc689>] __schedule+0xe/0x7d4
> > > Nov 20 21:12:00 localhost kernel: [<c046621f>] ?
> > audit_syscall_exit+0xfa/0x10f
> > > Nov 20 21:12:00 localhost kernel: [<c040a955>] ?
> > syscall_trace_leave+0xc8/0xef
> > > Nov 20 21:12:00 localhost kernel: [<c040338a>]
> work_resched+0x5/0x19
> >
> > Hmm, that comes from the low level code. We should have interrupts
> > disabled here, but I have a hard time to figure out the call path in
> > the ASM maze of entry_32.S. Still investigating.
> >
> > Thanks,
> >
> > 	tglx
> 
> Thomas-
> 
> Thank you for the help on this,
> 
> -Bob

I'm seeing this hang quite often now, some local users now reporting same issue even when systems lightly loaded - any ideas? 

On two systems, the problem has not shown up (so far) - both of these have been dell centrino duo laptops.  Higher-end Dell Desktops with core 2 duo seem to create problem at fairly random intervals but usually in 10 to 60 minutes. 

Can I add nosmp to kernel boot with rt patch, i.e. any stability consequences or other gottchas with no smp? Both 64 bit and 32 bit OS show problem with 64 bit seeming to have higher incidence under lighter loads.

-Bob


^ permalink raw reply	[flat|nested] 10+ messages in thread

end of thread, other threads:[~2009-12-16  1:56 UTC | newest]

Thread overview: 10+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2009-11-20 20:56 help needed, 2.6.31.6-rt19 hang with network user app Leyendecker, Robert
2009-11-20 21:44 ` Nikita V. Youshchenko
2009-11-21  3:56   ` Leyendecker, Robert
2009-11-21  8:25     ` Nikita V. Youshchenko
2009-11-21 16:20       ` Leyendecker, Robert
2009-11-23 15:34         ` Leyendecker, Robert
2009-11-24 15:47           ` Leyendecker, Robert
2009-11-27 19:43     ` Thomas Gleixner
2009-11-29  4:43       ` Leyendecker, Robert
2009-12-16  1:55         ` Leyendecker, Robert

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.